Sunday, February 21, 16:52
Home inet CentOS ceases to be supported but RHEL is offered for free

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

The long tradition - and the ambiguity in Red Hat's terms - led users to believe that CentOS 8 would be available by 2029, just like the RHEL 8 on which it was based. The shutdown of CentOS 8 in 2021 cut eight of those ten years, leaving thousands of users blocked.


CentOS Stream

Red Hat's announcement on CentOS Stream in December - which it initially identified as a "replacement" for CentOS Linux - confused many users on its role in the updated Red Hat ecosystem. This week, Red Hat makes the following clarifications:

To sum up: make CentOS Stream the collaboration center for RHEL, with the landscape looking like this:

  • Fedora Linux is the place for great innovations, thoughts and ideas for the new operating system.
  • CentOS Stream is the continuously delivered platform that becomes the next minor release of RHEL.
  • RHEL is the intelligent operating system for production workloads, used in almost every industry in the world.

Although CentOS Stream could be considered suitable for "home-labers", the lack of a well-defined life cycle made it inappropriate for the most productive use and, in particular, the use of production from stores that have chosen a RHEL compatible distribution from the beginning.

From February 1, 2021, Red Hat will make RHEL available at no cost for small production workloads - with "small" defined as 16 systems or less. This access at RHEL free of charge is done through the Red Hat Developer Subscription program and comes without restrictions.

Red Hat is also expanding the availability of developer subscriptions to groups as well as to individual users. Going forward, RHEL registered clients can add entire groups of developers to the developer subscription program at no cost. This allows the whole team to uses Red Hat Cloud Access for simplified development and maintenance of RHEL in well-known cloud providers, such as AWS, Google Cloud and Microsoft Azure.

Source of information:


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


How to add special effects to Instagram messages

Did you know that you can make instant Instagram messages more impressive? Like any other Instagram feature, you can add special ...

Only 270 addresses are responsible for 55% of all money laundering

Cybercriminals who keep their money in cryptocurrencies tend to "launder" money through a small set of online services, according to ...

Twitter: Voice messages are coming! How do we send them?

Twitter will soon support voice messages in both iOS and Android applications. This means that you will be able to send ...

How to connect a Bluetooth headset to a Nintendo Switch

The Nintendo Switch has a headphone jack. However, most headphones have become wireless so you will need a way to connect them ...

How to hide your phone number in Telegram

If you wish to create a Telegram account, you must provide your telephone number. In this way, Telegram validates the ...

Google Assistant: How can you delete your recordings?

Google Assistant can make your daily life much easier. However, it also involves some privacy issues, as ...

Microsoft: Office 2021 / Office LTSC coming in the second half of 2021

Microsoft announced that the Microsoft Office Long Term Service Channel (LTSC) and Office 2021 will be released in 2021, for ...

How to quickly create QR codes with Bing

If you ever need to create a QR code, but you do not know how, Microsoft has an easy-to-use tool available in any program ...

Brave: Onion addresses leaked to DNS traffic

The Tor function included in the Brave web browser, allows users to access .onion dark web domains within ...

What are the 6 most known attacks on gaming companies?

A few days ago, the gaming company Big Huge Games informed the players that it was the victim of an attack, which affected its data ...